Page 56 / 106 Scroll up to view Page 51 - 55
Ubee Interactive
Using the Port Triggers Option
Ubee DDW365 Advanced Wireless Gateway Subscriber User Guide
September 2015
52
The following example shows the Port Triggering option set up for a dual Xbox
configuration.
Label
Description
Remove All
Deletes all the port trigger rules.
Edit
Allows you to edit the properties of the selected rule.
Remove
Deletes the selected rule.
Clear All
Removes all of the input host’s MAC addresses.
Page 57 / 106
Ubee Interactive
Using the Pass Through Option
Ubee DDW365 Advanced Wireless Gateway Subscriber User Guide
September 2015
53
6.7
Using the Pass Through Option
Use the
Pass Through
option to configure a pass through table. Devices in the pass
through table are treated as bridge devices, storing and forwarding data between LAN
interconnections.
Steps
To configure a pass through table:
1.
Click
Advanced
from the main menu.
2. Click
Pass Through
from the left side menu. The pass through fields are explained
following this screen example.
6.8
Using the DMZ Host Option
Use the
DMZ
(Demilitarized Zone)
Host
option to expose a host IP address to the WAN
(public Internet). You can use this option when applications do not work with port triggers
or other networking strategies.
Label
Description
Pass Through MAC Addresses
Defines the input host’s MAC address.
Add MAC Address
Adds the input host’s MAC address.
Addresses entered: n/32
Displays the MAC addresses to be blocked. The number of
MAC addresses is shown as 0/32 where 0 is the number of
addresses in the list. You can add up to 32 MAC addresses at
one time.
Remove MAC Address
Removes the input host’s MAC address.
Clear All
Removes all of the input host’s MAC addresses.
Page 58 / 106
Ubee Interactive
Using the DMZ Host Option
Ubee DDW365 Advanced Wireless Gateway Subscriber User Guide
September 2015
54
Steps
To set up a DMZ host:
1.
Connect a PC to an Ethernet port on the DDW365. Make sure both devices are
powered on and functioning.
2. Connect a Home Gateway (or other device you wish to be in the DMZ) to an Ethernet
port on the DDW365.
3. Log in to the DDW365 Web user interface.
4. Click
Advanced
from the main menu.
5. Click
DMZ Host
from the left side menu.
6. Enter the IP address of the Home Gateway (host device) to be exposed to the WAN.
7.
Test the device to ensure Internet access is available and the device is functional. For
example, connect to the Internet from a PC connected to the Home Gateway.
Label
Description
DMZ Address
Defines the IP address of the host to be exposed.
Apply
Saves changes.
Page 59 / 106
Ubee DDW365 Advanced Wireless Gateway Subscriber User Guide
September 2015
55
7
Understanding the Firewall Menu
Use these instructions to configure the DDW365 firewall settings to control what types of
traffic are allowed on your network. The firewall can block certain Web-oriented cookies,
Java scripts, and pop-up windows. It is highly recommended the Firewall is left enabled at
all times to protect against denial of service (DoS) attacks. Refer to
Using the Basic Option
on page 55
to block Internet access to specific sites.
Note:
Firewall menu options are not available when the DDW365 is in Bridge mode. Refer
to
Using the Bridging Option on page 81
for more information.
Topics
See the following topics:
Using the Basic Option on page 55
Using the Local Log Option on page 56
Using the Remote Log Option on page 57
Steps
To access the firewall menu:
1.
Access the Web user interface. Refer to
Accessing the Web User Interface Locally on
page 15
.
2. Click
Firewall
from the main menu.
7.1
Using the Basic Option
Use the
Basic
option to filter Web content to block certain Web-oriented cookies, Java
scripts, and pop-up windows.
Steps
To filter Web content:
1.
Click
Firewall
from the main menu.
2. The
Basic
screen is displayed. Field descriptions are listed below the screen
example.
Page 60 / 106
Ubee Interactive
Using the Local Log Option
Ubee DDW365 Advanced Wireless Gateway Subscriber User Guide
September 2015
56
7.2
Using the Local Log Option
Use the
Local Log
to define firewall event log reporting through email alerts and report on
possible attacks on the system.
Steps
To define local log reporting:
1.
Click
Firewall
from the main menu.
2. Click
Local Log
from the left side menu. Field descriptions are listed below the screen
example.
Label
Description
IPv4 Firewall Protection
Defines the level of protection. Choices are Off, Low, Medium,
and High. Services are based on the protection level and
displayed in the Allowed Services window.
Port Scan Detection
When enabled, detects port scans that probe for available
ports and potentially use these ports to detect weakness in the
network.
Optimize for XBOX
When enabled, this feature stabilizes and improves video
streaming.
Apply
Saves changes.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top